tag:blogger.com,1999:blog-1108319748423147238.post2975177394610679440..comments2016-12-29T19:10:35.333-08:00Comments on Twisted Prim - Sarah Andrea Royce: The Security Confirmation BubbleSarahAndrea Roycehttp://www.blogger.com/profile/16627581196855835529noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-1108319748423147238.post-90238636630228246712013-07-18T23:55:31.616-07:002013-07-18T23:55:31.616-07:00From https://pressfreedomfoundation.org/encryption...From https://pressfreedomfoundation.org/encryption-works :<br /><br />"It's important to remember that just because you use free software doesn't mean you can't get hacked. People find zero day exploits for free software all the time, and sometimes sell them to governments and other malicious attackers. Free software users still download malicious attachments in their email, and they still often have badly configured and easily exploited services on their computers. And even worse, malware is often very good at hiding. If a free software user gets malware on their computer, it might stay there until the user formats their hard drive."SarahAndrea Roycehttps://www.blogger.com/profile/16627581196855835529noreply@blogger.com